WORK IN PROGRESS

Backup software

Backup software is a type of computer program used to perform a complete backup of files, data, hard drives, servers, etc. The software enables a user to make an exact duplicate of everything contained on the original source. This software must also be used to perform a recovery of the data or system in the event of a disaster.

See main article: Backup software

Broadband Wireless Access

a new technology providing people with high-speed internet connection. A wireless broadband modem transmits it via radio waves to the surrounding areas allowing devices equipped with wireless capacity within the distance to be able to connect to the Internet and making it portable. Sometimes, in order to access the network a password is needed and sometimes its for free

See main article: Broadband

Client/server network

This type of network describes the relationship between two computer programs in which one program is the client who makes requests and the other is the server which fulfils the request. This type of network provides a convenient way to interconnect programmes from different locations. For example. Computer transactions is a very common type of client / server network. It is common for users to check their bank accounts.

See main article: Networks

CT scanner

CT Scanners, also called CAT scanners, is a noninvasive medical test that allows doctors/physicians to identify sick such as cancer, cardio-vascular disease, infectious disease and musculo-skeletal disorders. CT scanners provide the doctors with multiple images or pictures of the inside of the body of the patient. Theses scans give more details than X-rays exams.

See main article: CT Scanners

Data redundancy

duplicating of unnecessary data for backup and data recovery

Disaster recovery

it is sometimes referred to a business continuity plan which shows how an organization deal with potential disasters. It is a plan that consists of precautions taken so the disasters are at its minimum so the organization can quickly go back into its functions. The eruption of computers contain financial information, personal information of clients or interruption of the service can lead to a big problem to the organization. Disaster recovery plan may be developed in the organization or purchase as a software application or a service. It is very important to test the disaster recovery plan as it contains all the information of the organization. If you don’t test, you better not have one as it is expensive to buy.

Embedded IT systems


EMR – electronic medical record

it is a computerized legal medical record

Failover systems

a backup operation that automatically switches to s standby database, server or network if the primary one has problems or is shut down due to problems. It automatically redirects the user to the backup system where it mimics the operations of the primary system.

File server

a computer that is responsible for the central storage and management of date files so other computers in the network can access the files. A file server allows people to share files over the network without using a storage device.

Firewall

a barrier to keep destructive sources away from your property. Firewall can either be a program or a hardware that filters the information coming into your private network or computer system from the Internet.

Internet

a worldwide system of computer networks where people can get information from each other’s computer with permission.

Intranet

a private network within an organization. The reason for having an intranet is so people can share information. The intranet is like a personal version of the internet where people can send and receive emails from people who has access to the intranet.

See main article: Private Networks

LAN hardware and software


Network server

a network specialized in providing shared resources to workstations and other servers on a computer network. Shared resources such as disk space, hardware access and email services

Peer-to-peer network

network created by two or more PCs so they can share resources without going through a separate server computer.

See main article: Networks

Security software and hardware

there are two main types of security software. They are virus protection software and software that removes adware and spyware.

Virus protection software: prevents and removes computer viruses. The software protection stops incoming viruses before they infect your computer. This type of software can also scan your computer to notify you about viruses on your computer. Updating of the software is needed to be effective against viruses.

Adware and spyware: software used to remove unwanted and malicious software applications that could be harmful to your computer.

Server

a computer or a device on a network that manages network resources. For example, a file server is a server that is specialized in storing files only. Users of the network can store their files on the server and can have access to them if they are connected to the server. A print server is a computer that manages the printers.

VPN



See main article: Private Networks

WiFi

WiFi stands for ‘wireless fidelity.’ A WiFi network, computers can connect to a router with a network card where the computer can access the Internet as the router is connected to the internet. Sometimes a password is needed in order to access the network.